Sciweavers

3667 search results - page 563 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
AUSFORENSICS
2004
13 years 11 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli
CMS
2006
175views Communications» more  CMS 2006»
13 years 11 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
ECIS
2004
13 years 11 months ago
Reasons Behind ERP Package Adoption: A Diffusion of Innovations Perspective
Enterprise Resource Planning (ERP) packages have been widely adopted and it is becoming clear that this is driven by multiple rationales that may be simultaneously at odds and com...
Ben Light, Anastasia Papazafeiropoulou
MSV
2004
13 years 11 months ago
Design and Implementation of a Workflow Rendering Engine
Business visualization is an effective tool for business decision making and problem solving. Despite its obvious benefits, 3D visualization is far less common in practice than it...
Jason A. Pamplin, Ying Zhu
IADIS
2003
13 years 11 months ago
Selecting an Approach to Designing Group Support Systems
The increasing demand for group support in software has drawn more attention to the field of designing Group Support Systems. Notwithstanding all the research in this field the pr...
Jeroen van den Heuvel, Kees van Slooten, Roy Tai